Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Clemson University

Theses/Dissertations

Deep Learning

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Robust And Trustworthy Deep Learning: Attacks, Defenses And Designs, Bingyin Zhao May 2024

Robust And Trustworthy Deep Learning: Attacks, Defenses And Designs, Bingyin Zhao

All Dissertations

Deep neural networks (DNNs) have achieved unprecedented success in many fields. However, robustness and trustworthiness have become emerging concerns since DNNs are vulnerable to various attacks and susceptible to data distributional shifts. Attacks such as data poisoning and out-of-distribution scenarios such as natural corruption significantly undermine the performance and robustness of DNNs in model training and inference and impose uncertainty and insecurity on the deployment in real-world applications. Thus, it is crucial to investigate threats and challenges against deep neural networks, develop corresponding countermeasures, and dig into design tactics to secure their safety and reliability. The works investigated in this …


Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi Aug 2023

Generalizable Deep-Learning-Based Wireless Indoor Localization, Ali Owfi

All Theses

The growing interest in indoor localization has been driven by its wide range of applications in areas such as smart homes, industrial automation, and healthcare. With the increasing reliance on wireless devices for location-based services, accurate estimation of device positions within indoor environments has become crucial. Deep learning approaches have shown promise in leveraging wireless parameters like Channel State Information (CSI) and Received Signal Strength Indicator (RSSI) to achieve precise localization. However, despite their success in achieving high accuracy, these deep learning models suffer from limited generalizability, making them unsuitable for deployment in new or dynamic environments without retraining. To …


Visualizing Features From Deep Neural Networks Trained On Alzheimer’S Disease And Few-Shot Learning Models For Alzheimer’S Disease, John Reeder Dec 2021

Visualizing Features From Deep Neural Networks Trained On Alzheimer’S Disease And Few-Shot Learning Models For Alzheimer’S Disease, John Reeder

All Theses

Alzheimer’s disease is an incurable neural disease, usually affecting the elderly. The afflicted suffer from cognitive impairments that get dramatically worse at each stage. Previous research on Alzheimer’s disease analysis in terms of classification leveraged statistical models such as support vector machines. However, statistical models such as support vector machines train the from numerical data instead of medical images. Today, convolutional neural networks (CNN) are widely considered as the one which can achieve the state-of-the- art image classification performance. However, due to their black box nature, there can be reluctance amongst medical professionals for their use. On the other hand, …


Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay Dec 2021

Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay

All Theses

The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …